Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: CA

CA Strong Authentication offers businesses low-cost MFA and 2FA

Post Image

CA Strong Authentication offers businesses low-cost MFA and 2FA CA Technologies’ Strong Authentication product is a multifactor authentication product that adds additional security measures — using biometrics and smartphones — to standard username/password logins for a variety of servers and services, such as Active Directory, Salesforce and the Outlook web app. Read more at – CA Strong Authentication offers businesses low-cost MFA […]

Post Tagged with , , ,
Read More

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide

Post Image

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide Gartner, Inc. has named CA Technologies (NASDAQ:CA) a Leader in the Gartner Magic Quadrant for Access Management, Worldwide 2017.* The report evaluated CA’s broad identity and access management portfolio and the company’s ability to execute and completeness of vision. “Access managers […]

Post Tagged with ,
Read More

CA Strong Authentication offers businesses low-cost MFA and 2FA

Post Image

CA Strong Authentication offers businesses low-cost MFA and 2FA CA Strong Authentication brings inexpensive multi- and two-factor authentication to businesses looking to protect mobile applications and devices and to prevent identity theft. CA Technologies’ Strong Authentication product is a multifactor authentication product that adds additional security measures — using biometrics and smartphones — to standard username/password logins for […]

Post Tagged with , ,
Read More

CA Technologies Predicts Identity and Access Management Trends for 2015

CA Technologies Predicts Identity and Access Management Trends for 2015 CA Technologies today announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they compete in the application economy. “The impact of data breaches in 2014, coupled with the demands of the application […]

Read More